Télécharger le livre :  Integrating ISA Server 2006 with Microsoft Exchange 2007
This book is a convenient, targeted, single-source guide to integrating Microsoft's ISA Server with Exchange 2007 SP1. Unlike longwinded "comprehensive resources" it doesn't waste time re-hashing general information on the architectures and purposes of ISA and Exchange...

Editeur : Syngress
Parution : 2011-08-31
epub sans DRM

42,15

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Check Point NGX R65 Security Administration
Check Point NGX R65 is the next major release ofCheck Point's flagship firewall software product, which has over 750,000 registered users.Check Point's NGX is the underlying security software platform for all of the company's enterprise firewall, VPN and management...

Editeur : Syngress
Parution : 2011-08-31
PDF sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Real MCTS/MCITP Exam 70-646 Prep Kit
This exam is designed to validate skills as a Windows Server 2008 Server Administrator.This exam will fulfill the Windows Server 2008 IT Professional requirements of Exam 70-646.The Microsoft Certified IT Professional(MCITP) on Windows Server 2008 credential is intended...

Editeur : Syngress
Parution : 2011-08-31
PDF sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Official CHFI Study Guide (Exam 312-49)
This is the official CHFI (Computer Hacking Forensics Investigator) study guide for professionals studying for the forensics exams and for professionals needing the skills to identify an intruder's footprints and properly gather the necessary evidence to prosecute. The...

Editeur : Syngress
Parution : 2011-08-31
PDF, epub sans DRM

51,64

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Penetration Tester's Open Source Toolkit
Penetration Tester's Open Source Toolkit, Third Edition, discusses the open source tools available to penetration testers, the ways to use them, and the situations in which they apply. Great commercial penetration testing tools can be very expensive and sometimes hard...

Editeur : Syngress
Parution : 2011-08-25
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Deception
The world's most infamous hacker offers an insider's view of thelow-tech threats to high-tech securityKevin Mitnick's exploits as a cyber-desperado and fugitive form oneof the most exhaustive FBI manhunts in history and have spawneddozens of articles, books, films, and...

Editeur : Wiley
Parution : 2011-08-04
PDF, ePub

15,61

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  The Art of Deception
The world's most infamous hacker offers an insider's view of the low-tech threats to high-tech security Kevin Mitnick's exploits as a cyber-desperado and fugitive form one of the most exhaustive FBI manhunts in history and have spawned dozens of articles, books, films,...

Editeur : Wiley
Parution : 2011-08-04
PDF, ePub

16,88

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Multimedia Security Technologies for Digital Rights Management
Security is a major concern in an increasingly multimedia-defined universe where the Internet serves as an indispensable resource for information and entertainment. Digital Rights Management (DRM) is the technology by which network systems protect and provide access to...

Editeur : Academic Press
Parution : 2011-07-28
PDF sans DRM

85,40

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  iPhone and iOS Forensics
iPhone and iOS Forensics is a guide to the forensic acquisition and analysis ofiPhone and iOS devices, and offers practical advice on how to secure iOS devices, data and apps. The book takes an in-depth look at methods and processes that analyze the iPhone/iPod in an...

Editeur : Syngress
Parution : 2011-07-25
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Android Forensics
Android Forensics: Investigation, Analysis, and Mobile Security for GoogleAndroid provides the background, techniques and analysis tools you need to effectively investigate anAndroid phone. This book offers a thorough review of theAndroid platform, including the core...

Editeur : Syngress
Parution : 2011-07-21
epub sans DRM

56,92

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Thor's Microsoft Security Bible
Thor's Microsoft Security Bible provides a one-stop-shop for Microsoft-related security techniques and procedures as applied to the typical deployment of a Microsoft-based infrastructure. Written by world-renowned security expert Timothy Thor Mullen, the book presents a...

Editeur : Syngress
Parution : 2011-07-16
epub sans DRM

48,48

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Cyber Warfare
Cyber Warfare Techniques, Tactics and Tools for Security Practitioners provides a comprehensive look at how and why digital warfare is waged. This book explores the participants, battlefields, and the tools and techniques used during today's digital conflicts. The...

Editeur : Syngress
Parution : 2011-07-13
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security on the Web
Since its first volume in 1960, Advances in Computers has presented detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater...

Editeur : Academic Press
Parution : 2011-07-08
PDF sans DRM

140,31

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Microsoft Windows Security Essentials
Windows security concepts and technologies for IT beginners IT security can be a complex topic, especially for those new to the field of IT. This full-color book, with a focus on the Microsoft Technology Associate (MTA) program, offers a clear and easy-to-understand...

Editeur : Sybex
Parution : 2011-06-03
PDF, ePub

36,08

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Computer Viruses For Dummies
Computer viruses—just the thought of your trusty PC catching one is probably enough to make you sick. Thanks to the cyber-sickies who persist in coming up with new strains, there’s a major new cyberattack nearly every day. Viruses sneak in, usually through e-mail. ...

Editeur : For Dummies
Parution : 2011-05-09
PDF, ePub

17,30

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  User Experience Management
User Experience Management: Essential Skills for Leading Effective UX Teams deals with specific issues associated with managing diverse user experience (UX) skills, often in corporations with a largely engineering culture. Part memoir and part handbook, it explains what...

Editeur : Morgan Kaufmann
Parution : 2011-05-09
epub sans DRM

33,71

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Web Commerce Security
A top-level security guru for both eBay and PayPal and a best-selling information systems security author show how to design and develop secure Web commerce systems. Whether it's online banking or ordering merchandise using your cell phone, the world of online commerce...

Editeur : Wiley
Parution : 2011-05-04
PDF, ePub

54,12

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  IP Address Management
This book will be the first covering the subject of IP address management (IPAM). The practice of IPAM includes the application of network management disciplines to IP address space and associated network services, namely DHCP (Dynamic Host Configuration Protocol) and...

Editeur : Wiley-IEEE Press
Parution : 2011-04-20
Collection : IEEE Press Series on Network and Service Management ePub

137,10

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Security Risk Management
Security Risk Management is the definitive guide for building or running an information security risk management program. This book teaches practical techniques that will be used on a daily basis, while also explaining the fundamentals so students understand the...

Editeur : Syngress
Parution : 2011-04-20
epub sans DRM

41,09

Téléchargement immédiat
Dès validation de votre commande
Télécharger le livre :  Building a Digital Forensic Laboratory
The need to professionally and successfully conduct computer forensic investigations of incidents and crimes has never been greater. This has caused an increased requirement for information about the creation and management of computer forensic laboratories and the...

Editeur : Syngress
Parution : 2011-04-19
epub sans DRM

66,41

Téléchargement immédiat
Dès validation de votre commande
<< < 2021222324 >